Skip to content

Commit

Permalink
treefile: Add finalize.d
Browse files Browse the repository at this point in the history
This is a total escape hatch for arbitrary mutation of
the filesystem tree just before we do an ostree commit.

Signed-off-by: Colin Walters <walters@verbum.org>
  • Loading branch information
cgwalters committed Oct 4, 2024
1 parent 84de7cc commit 84bf1f0
Show file tree
Hide file tree
Showing 3 changed files with 113 additions and 1 deletion.
13 changes: 13 additions & 0 deletions docs/treefile.md
Original file line number Diff line number Diff line change
Expand Up @@ -506,6 +506,19 @@ It supports the following parameters:
it from affecting the commit checksum. Setting it to `disabled` will
prevent the metadata from being added at all.

## Associated directories

In edition `2024`, "associated directories" have been introduced. These
are "drop-in" style directories which can contain inline content or
scripts. When processing a manifest file, if these subdirectories exist
in the same directory as the manifest, they will be automatically used:

- `finalize.d`: Executed synchronously in alphanumeric order from the
host/ambient environment (*not* from the target); the current working directory will be
the target root filesystem. There is no additional sandboxing or containerization
applied to the execution of the binary. The builtin "change detection"
is not applied to the content of the scripts.

## Experimental options

All options listed here are subject to change or removal in a future
Expand Down
5 changes: 4 additions & 1 deletion rust/src/composepost.rs
Original file line number Diff line number Diff line change
Expand Up @@ -1199,10 +1199,13 @@ fn workaround_selinux_cross_labeling_recurse(
}

/// This is the nearly the last code executed before we run `ostree commit`.
pub fn compose_postprocess_final(rootfs_dfd: i32, _treefile: &Treefile) -> CxxResult<()> {
pub fn compose_postprocess_final(rootfs_dfd: i32, treefile: &Treefile) -> CxxResult<()> {
let rootfs = unsafe { &crate::ffiutil::ffi_dirfd(rootfs_dfd)? };

hardlink_rpmdb_base_location(rootfs, None)?;

treefile.exec_finalize_d(rootfs)?;

Ok(())
}

Expand Down
96 changes: 96 additions & 0 deletions rust/src/treefile.rs
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,9 @@
use crate::cxxrsutil::*;
use anyhow::{anyhow, bail, Context, Result};
use camino::{Utf8Path, Utf8PathBuf};
use cap_std::fs::MetadataExt as _;
use cap_std_ext::cap_std::fs::Dir;
use cap_std_ext::cmdext::CapStdExtCommandExt;
use cap_std_ext::prelude::CapStdExtDirExt;
use nix::unistd::{Gid, Uid};
use once_cell::sync::Lazy;
Expand All @@ -36,6 +38,7 @@ use std::io::prelude::*;
use std::os::unix::fs::{MetadataExt, PermissionsExt};
use std::os::unix::io::{AsRawFd, RawFd};
use std::path::{Path, PathBuf};
use std::process::Command;
use std::str::FromStr;
use std::{fs, io};
use tracing::{event, instrument, Level};
Expand All @@ -48,6 +51,9 @@ use crate::utils::OptionExtGetOrInsertDefault;

const INCLUDE_MAXDEPTH: u32 = 50;

// The directory with executable scripts for image finalization
const FINALIZE_D: &str = "finalize.d";

/// Path to the flattened JSON serialization of the treefile, installed on the target (client)
/// filesystem. Nothing actually parses this by default client side today,
/// it's intended to be informative.
Expand All @@ -64,6 +70,7 @@ pub(crate) struct TreefileExternals {
add_files: BTreeMap<String, fs::File>,
passwd: Option<fs::File>,
group: Option<fs::File>,
pub(crate) finalize_d: BTreeMap<String, Utf8PathBuf>,
}

// This type name is exposed through ffi.
Expand Down Expand Up @@ -304,6 +311,30 @@ fn treefile_parse<P: AsRef<Path>>(
}
}
let parent = utils::parent_dir(filename).unwrap();
let parent: &Utf8Path = parent.try_into()?;
let dir = Dir::open_ambient_dir(parent, cap_std::ambient_authority())?;
let finalize_d = if let Some(d) = dir.open_dir_optional(FINALIZE_D)? {
let mut r = BTreeMap::new();
for ent in d.entries()? {
let ent = ent?;
let meta = ent.metadata()?;
if !meta.is_file() {
continue;
}
if meta.mode() & libc::S_IXUSR == 0 {
continue;
}
let name = ent.file_name();
let name = name
.to_str()
.ok_or_else(|| anyhow::anyhow!("non UTF-8 name '{name:?}'"))?;
let path = format!("{parent}/{FINALIZE_D}/{name}");
r.insert(name.to_owned(), path.into());
}
r
} else {
BTreeMap::new()
};
let passwd = match tf.get_check_passwd() {
CheckPasswd::File(ref f) => load_passwd_file(&parent, f)?,
_ => None,
Expand All @@ -320,6 +351,7 @@ fn treefile_parse<P: AsRef<Path>>(
add_files,
passwd,
group,
finalize_d,
},
})
}
Expand Down Expand Up @@ -508,6 +540,10 @@ fn treefile_merge_externals(dest: &mut TreefileExternals, src: &mut TreefileExte
if dest.group.is_none() {
dest.group = src.group.take();
}

while let Some((name, f)) = src.finalize_d.pop_first() {
dest.finalize_d.insert(name, f);
}
}

/// Recursively parse a treefile, merging along the way.
Expand Down Expand Up @@ -773,6 +809,21 @@ impl Treefile {
Ok(rpackages)
}

/// Execute all finalize.d scripts
pub(crate) fn exec_finalize_d(&self, rootfs: &Dir) -> Result<()> {
for (name, path) in self.externals.finalize_d.iter() {
println!("Executing: {name}");
let st = Command::new(path)
.cwd_dir(rootfs.try_clone()?)
.status()
.with_context(|| format!("exec {path:?}"))?;
if !st.success() {
anyhow::bail!("finalize.d {name} failed: {st:?}");
}
}
Ok(())
}

pub(crate) fn add_packages(
&mut self,
packages: Vec<String>,
Expand Down Expand Up @@ -3820,6 +3871,51 @@ conditional-include:
"#};
let tf = new_test_treefile(workdir, tf, None).unwrap();
assert!(tf.parsed.base.tmp_is_dir.unwrap());
assert!(tf.externals.finalize_d.is_empty());
}

#[test]
fn test_finalize() -> Result<()> {
let workdir = tempfile::tempdir().unwrap();
let workdir: &Utf8Path = workdir.path().try_into().unwrap();
let tf = indoc! { r#"
edition: "2024"
"#};
let finalize_d = workdir.join(FINALIZE_D);
std::fs::create_dir(&finalize_d).unwrap();
std::fs::write(
finalize_d.join("01-foo"),
indoc::indoc! { r#"
#!/bin/bash
touch foo
sleep 1
"# },
)?;
std::fs::write(
finalize_d.join("02-bar"),
indoc::indoc! { r#"
#!/bin/bash
touch bar
"# },
)?;
for ent in std::fs::read_dir(&finalize_d).unwrap() {
let ent = ent?;
std::fs::set_permissions(ent.path(), fs::Permissions::from_mode(0o755))?;
}
let rootpath = workdir.join("rootfs");
std::fs::create_dir(&rootpath)?;
let rootpath = Dir::open_ambient_dir(&rootpath, cap_std::ambient_authority())?;

let tf = new_test_treefile(workdir, tf, None).unwrap();
assert_eq!(tf.externals.finalize_d.len(), 2);

tf.exec_finalize_d(&rootpath)?;

let foometa = rootpath.symlink_metadata("foo").unwrap();
let barmeta = rootpath.symlink_metadata("bar").unwrap();
assert!(foometa.modified().unwrap() < barmeta.modified().unwrap());

Ok(())
}

#[test]
Expand Down

0 comments on commit 84bf1f0

Please sign in to comment.